Do you know about user security awareness? To check your knowledge of user information security awareness, take this quiz. In this awareness program, the employees of an organization are educated about cybercrimes and other social-engineering attacks. You can take this test and see how well do you understand this user security awareness, as your scores will reveal your knowledge on See morethe same. While taking the quiz, you can learn new things also. All the best for a perfect score! Share the quiz with your friends and colleagues.
Your child or pet name.
Using numbers or symbols.
A combination of upper and lowercase letters along with numbers and symbols.
Using some common words from the dictionary.
Rate this question:
MySecret
Dp0si#Z$2
Abc123
Keyboard
Rate this question:
Instant Message
Internet download
Portable media
Rate this question:
Must open the attachment to view its contents.
Just delete the email.
Initially, forward the email to your co-workers to allow them to open the attachment first.
Forward the email to your personal email account, so you can open it at home.
Rate this question:
Try deleting an unexpected or unsolicited message.
Try using antivirus software to scan attachments before opening.
Try deleting similar messages that appear more than once in your Inbox.
All the above.
Rate this question:
Do not email personal information.
Do send out price lists for your home-based business products.
Forward inspirational and humorous emails to your co-workers to brighten their day for entertainment.
Share an email with all your friends and co-workers to advertise a job opening in your area.
Rate this question:
True
False
Rate this question:
Frustration with co-workers.
Stress.
Promotion.
Financial problems.
Rate this question:
Phishing attacks.
Virus attacks.
Spyware.
All of the above.
Rate this question:
A program that is secretly installed onto your computer and makes copies of itself consumes your computer resources.
A program that protects your computer from hackers.
A program that is installed onto your computer monitors your internet use.
All of the above.
Rate this question:
Do not give out computer or network information.
Do not complete confidential company tasks in an insecure setting.
Do not secure sensitive documents and media.
Do not give out personally identifiable information.
Rate this question:
Conducting business for personal gain.
Using company resources for political purposes.
Sending an occasional personal email.
Download music and video files.
Rate this question:
Spyware or Adware installation.
Browser Hijacking.
Information or identity theft.
All of the above.
Rate this question:
Avoid
Recognize
Challenge
Log
Rate this question:
Do not reply to the message.
Click the link so you can see what the site looks like.
Keep your system up to date, and install up-to-date antivirus and antispyware software.
Report the phishing email to the legitimate company or organization that has been spoofed.
Rate this question:
Change your password.
Report the incident to the proper authorities - such as a system administrator(s).
Check other systems that you have accounts on as they may be compromised as well.
All the above.
Rate this question:
When leaving work, always wear your security badge, even if it is for a break. It should also be worn outside of the office in public for other people to know where you work.
Control access to your office by ensuring the door is closed completely behind when entering and exiting from the area. Ensure that no one slips in behind you.
During a task in a public setting, avoid shoulder surfing by shielding your paperwork and keyboard from view using your body.
You must follow the Clear Desk and Screen Policy. Also, store confidential and sensitive items in a secure place.
Rate this question:
Instant Messaging, Peer-to-Peer (P2P) applications.
Malware - virus, worms, spyware.
Spam, Phishing attacks.
End Users.
Rate this question:
Computer security is part of everyone's job.
Verify everything! You need to verify that the website is real. Also, verify that the visitor belongs where you find them.
Report anything suspicious to your system administrator.
Do not ignore unusual computer functioning. It might be a sign of malware.
Rate this question:
Quiz Review Timeline (Updated): Feb 14, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.